CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Filters
6 research outputs found
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
Author
Asmuth
Benaloh
+32 more
Blakley
Catrina
Chang
Chien
Chor
Eslami
Godel
Hadian Dehkordi
Harn
Harn
Harn
Harn
He
He
Hu
Hwang
Kaya
Kaya
Kurosawa
Lin
Lin
Mceliece
Obana
Pang
Rivest
Shamir
Shao
Tartary
Wang
Wang
Yang
Zhao
Publication venue
'Wiley'
Publication date
Field of study
No full text
Crossref
SECURE CLOUD STORAGE USING SECRET SHARING SCHEME
Author
Publication venue
Publication date
Field of study
Get PDF
KFUPM ePrints
SECURE CLOUD STORAGE USING SECRET SHARING SCHEME
Author
Publication venue
Publication date
Field of study
Get PDF
KFUPM ePrints